-
3
-
-
84957796178
-
On covering and rank problems for Boolean matrices and their applications
-
Springer-Verlag, Berlin
-
DAMM, C., KIM, K. H., AND ROUSH, F. 1999. On covering and rank problems for Boolean matrices and their applications. In Proceedings of the 5th Annual International Conference on Computing and Combinatorics. Springer-Verlag, Berlin, 123-133.
-
(1999)
Proceedings of the 5th Annual International Conference on Computing and Combinatorics
, pp. 123-133
-
-
Damm, C.1
Kim, K.H.2
Roush, F.3
-
4
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
ACM, New York
-
ENE, A.,HORNE, W.,MILOSAVLJEVIC, N., RAO, P., SCHREIBER, R., AND JAN, R. T. 2008. Fast exact and heuristic methods for role minimization problems. In Proceedings of the Symposium on Access Control Models and Technologies. ACM, New York.
-
(2008)
Proceedings of the Symposium on Access Control Models and Technologies
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Jan, R.T.6
-
5
-
-
84949220539
-
Engineering of role/permission assignments
-
IEEE, Los Alamitos, CA
-
EPSTEIN, P. AND SANDHU, R. 2001. Engineering of role/permission assignments. In Proceedings of the 17th Annual Computer Security Applications Conference. IEEE, Los Alamitos, CA, 127-136.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 127-136
-
-
Epstein, P.1
Sandhu, R.2
-
7
-
-
84992227458
-
Proposed nist standard for role-based access control
-
FERRAIOLO, D. F., SANDHU, R., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed nist standard for role-based access control. ACM Trans. Inform. Syst. Secur. 4, 3, 224-274.
-
(2001)
ACM Trans. Inform. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
8
-
-
4243280162
-
-
Planning Report 02-11, National Institute of Standards and Technology
-
GALLAGHER, M. P.,O'CONNOR, A. C., AND KROPP, B. 2002. The economic impact of role-based access control. Planning report 02-11, National Institute of Standards and Technology.
-
(2002)
The Economic Impact of Role-based Access Control
-
-
Gallagher, M.P.1
O'Connor, A.C.2
Kropp, B.3
-
10
-
-
35048813595
-
Tiling databases
-
Springer-Verlag, Berlin
-
GEERTS, F., GOETHALS, B., AND MIELIKAINEN, T. 2004. Tiling databases. In Discovery Science. Springer-Verlag, Berlin, 278-289.
-
(2004)
Discovery Science
, pp. 278-289
-
-
Geerts, F.1
Goethals, B.2
Mielikainen, T.3
-
11
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
ACM, New York
-
HAN, J., PEI, J., AND YIN, Y. 2000. Mining frequent patterns without candidate generation. In Proceedings of the International Conference on Management of Data. ACM, New York, 1-12.
-
(2000)
Proceedings of the International Conference on Management of Data
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
12
-
-
0000947357
-
Approximating clique and biclique problems
-
HOCHBAUM, D. S. 1998. Approximating clique and biclique problems. J. Algorithms 29, 1, 174-200.
-
(1998)
J. Algorithms
, vol.29
, Issue.1
, pp. 174-200
-
-
Hochbaum, D.S.1
-
13
-
-
0242709337
-
Observations on the role lifecycle in the context of enterprise security management
-
ACM, New York
-
KERN, A., KUHLMANN, M., SCHAAD, A., AND MOFFETT, J. 2002. Observations on the role lifecycle in the context of enterprise security management. In Proceedings of the 7th Symposium on Access Control Models and Technologies. ACM, New York, 43-51.
-
(2002)
Proceedings of the 7th Symposium on Access Control Models and Technologies
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
14
-
-
0242625194
-
Role mining-revealing business roles for security administration using data mining technology
-
ACM, New York
-
KUHLMANN, M., SHOHAT, D., AND SCHIMPF, G. 2003. Role mining-revealing business roles for security administration using data mining technology. In Proceedings of the 8th Symposium on Access Control Models and Technologies. ACM, New York, 179-186.
-
(2003)
Proceedings of the 8th Symposium on Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
15
-
-
48349103211
-
Optimal Boolean matrix decomposition: Application to role engineering
-
IEEE, Los Alamitos, CA
-
LU, H., VAIDYA, J., AND ATLURI, V. 2008. Optimal Boolean matrix decomposition: Application to role engineering. In Proceedings of the 24th International Conference on Data Engineering. IEEE, Los Alamitos, CA, 297-306.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering
, pp. 297-306
-
-
Lu, H.1
Vaidya, J.2
Atluri, V.3
-
16
-
-
51249163234
-
Ordering d-classes and computing schein rank is hard
-
MARKOWSKY, G. 1992. Ordering d-classes and computing schein rank is hard. Semi-Group Forum 44, 373-375.
-
(1992)
Semi-Group Forum
, vol.44
, pp. 373-375
-
-
Markowsky, G.1
-
18
-
-
34548041366
-
-
master's thesis M.S. thesis, University of Helsinki
-
MIETTINEN, P. 2006. The discrete basis problem, master's thesis. M.S. thesis, University of Helsinki.
-
(2006)
The Discrete Basis Problem
-
-
Miettinen, P.1
-
19
-
-
33750356685
-
The discrete basis problem
-
Springer, Berlin
-
MIETTINEN, P., MIELIKAINEN, T., GIONIS, A., DAS, G., AND MANNILA, H. 2006. The discrete basis problem. In Proceedings of the 10th European Conference on Principles and Knowledge Discovery in Databases. Springer, Berlin, 335-346.
-
(2006)
Proceedings of the 10th European Conference on Principles and Knowledge Discovery in Databases
, pp. 335-346
-
-
Miettinen, P.1
Mielikainen, T.2
Gionis, A.3
Das, G.4
Mannila, H.5
-
20
-
-
9444294939
-
On finding large conjunctive clusters
-
Springer, Berlin
-
MISHRA, N.,RON, D., AND SWAMINATHAN, R. 2003. On finding large conjunctive clusters. In Learning Theory and Kernel Machines: Proceedings of the 16th Annual Conference on Learning Theory and 7th Kernel Workshop (COLT/Kernel'03). Springer, Berlin, 448-462.
-
(2003)
Learning Theory and Kernel Machines: Proceedings of the 16th Annual Conference on Learning Theory and 7th Kernel Workshop (COLT/Kernel'03)
, pp. 448-462
-
-
Mishra, N.1
Ron, D.2
Swaminathan, R.3
-
21
-
-
57349105655
-
Mining roles with semantic meanings
-
ACM, New York
-
MOLLOY, I., CHEN, H., LI, T., WANG, Q., LI, N., BERTINO, E., CALO, S., AND LOBO, J. 2008. Mining roles with semantic meanings. In Proceedings of the 13th Symposium on Access Control Models and Technologies. ACM, New York, 21-30.
-
(2008)
Proceedings of the 13th Symposium on Access Control Models and Technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
23
-
-
77952367051
-
Carpenter: Finding closed patterns in long biological datasets
-
ACM, New York
-
PAN, F.,CONG, G.,TUNG, A. K.H.,YANG, J., AND ZAKI, M. J. 2003. Carpenter: Finding closed patterns in long biological datasets. In Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining. ACM, New York, 637-642.
-
(2003)
Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining
, pp. 637-642
-
-
Pan, F.1
Cong, G.2
Tung, A.K.H.3
Yang, J.4
Zaki, M.J.5
-
24
-
-
0141998079
-
Themaximum edge biclique problem is np-complete
-
PEETERS, R. 2003. Themaximum edge biclique problem is np-complete. Discrete Appl. Math. 131, 3, 651-654.
-
(2003)
Discrete Appl. Math.
, vol.131
, Issue.3
, pp. 651-654
-
-
Peeters, R.1
-
25
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
ACM, New York
-
ROECKLE, H., SCHIMPF, G., AND WEIDINGER, R. 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of the 5th Workshop on Role-based Access Control. ACM, New York, 103-110.
-
(2000)
Proceedings of the 5th Workshop on Role-based Access Control
, pp. 103-110
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
-
26
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2, 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
0035790675
-
The role-based access control system of a European bank: A case study and discussion
-
ACM, New York
-
SCHAAD, A.,MOFFETT, J., AND JACOB, J. 2001. The role-based access control system of a European bank: a case study and discussion. In Proceedings of the 6th Symposium on Access ControlModels and Technologies. ACM, New York, 3-9.
-
(2001)
Proceedings of the 6th Symposium on Access ControlModels and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
29
-
-
0242625196
-
On modeling system-centric information for role engineering
-
ACM, New York
-
SHIN, D., AHN, G.-J., CHO, S., AND JIN, S. 2003. On modeling system-centric information for role engineering. In Proceedings of the 8th Symposium on Access Control Models and Technologies. ACM, New York, 169-178.
-
(2003)
Proceedings of the 8th Symposium on Access Control Models and Technologies
, pp. 169-178
-
-
Shin, D.1
Ahn, G.-J.2
Cho, S.3
Jin, S.4
-
30
-
-
84982871639
-
Role-based access control framework for network enterprises
-
IEEE, Los Alamitos, CA
-
THOMSEN, D., O'BRIEN, R., AND BOGLE, J. 1998. Role-based access control framework for network enterprises. In Proceedings of the 14th Annual Computer Security Applications Conference. IEEE, Los Alamitos, CA, 50-58.
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 50-58
-
-
Thomsen, D.1
O'Brien, R.2
Bogle, J.3
-
31
-
-
34547237958
-
Roleminer: Finding roles using subset enumeration
-
ACM, New York
-
VAIDYA, J., ATLURI, V., AND WARNER, J. 2006. Roleminer: Finding roles using subset enumeration. In Proceedings of the 13th Conference on Computer and Communications Security. ACM, New York.
-
(2006)
Proceedings of the 13th Conference on Computer and Communications Security
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
|